This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle MySQL Cluster. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of Data Node jobs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL Cluster |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-1229 is considered a critical vulnerability due to its ability to allow remote code execution without authentication.
To remediate ZDI-21-1229, it is recommended to update Oracle MySQL Cluster to the latest version that addresses this vulnerability.
Exploitation of ZDI-21-1229 could lead to the complete compromise of the affected MySQL Cluster environment, permitting attackers to execute arbitrary code.
ZDI-21-1229 affects installations of Oracle MySQL Cluster running vulnerable versions of the software.
No, ZDI-21-1229 can be exploited by attackers without any form of authentication against the vulnerable Oracle MySQL Cluster.